17 Actions for Staying Anonymous on the Internet

lawmakers-call-for-an-end-to-internet-anonymity-28d9f678d4

Prerequisites: Physical: Laptop, debian or other Linux install file Software: gcc, g++, make, libncurses5-dev, patch, srm, tor, proxychains, ssh, pidgin, pidgin-otr, wpa_supplicant, mac-address-changer Here, we will discuss a great number of things you can do to keep yourself as anonymous … Continue reading

Find Openings in Firewalls with Firewalk in Linux/UNIX

firewall

Access control lists represent an important first line of defense on most networks, since they are commonly used on routers to limit the protocols allowed to pass to host systems behind the router. Firewalk is an open source tool that … Continue reading

John the Ripper Basics Tutorial

john-1

I wrote this tutorial as best I could to try to explain to the newbie how to operate JTR. Remember, this is a newbie tutorial, so I won’t go into detail with all of the features. JTR is a program … Continue reading

Crack Wifi Encryption with Kali Linux – Fern Wifi Cracker for WEP Hacking

wifi_hack

Today we will cover cracking WEP Wifi Network Encryption with Fern Wifi Cracker. This Hacking tool comes prepacked in Kali Linux. This is a relatively simple process anyone can do with the proper equipment and following this tutorial. First you … Continue reading

Want to Know How the Target Hackers Stole Your Credit Card?

target-2

As nearly everyone has heard, Target Corporation, one of the largest retailers in the U.S. and Canada, was hacked late last year and potentially 100 million credit cards have been compromised. Happening just before Christmas, it severely dampened Target’s Christmas … Continue reading

How to Pivot from Victim System to Owning the Network with Metasploit

cyber-attack

To own a network and retrieve the key data, we only need to find ONE weak link in the network. It makes little sense to beat our heads against heavily fortified systems like the file and database server when we … Continue reading

Tutorial: Crack Private and Public SNMP Passwords Using Onesixtyone on Kali

snmp

In a recent tutorial, I showed how the SNMP protocol can be a gold mine of information for reconnaissance on a potential target. If you haven’t already, I strongly suggest that you read it before progressing here, as little of … Continue reading

Wordlists for Password Cracking and Other Brute Force Resources

Biggest password cracking wordlist

Brute Forcing and Dictionary Attacks are two methods of getting the same result, a password. Dictionary Cracking can mostly rely on the quality of your word list. Quite often, I have people ask me where they can get wordlists. It … Continue reading

How To Hack: Kali Linux Router Password Hack Using Medusa

medusa

Medusa is described as a “speedy, massively parallel, modular, login brute-forcer” with modules available to support almost any service that allows remote authentication using a password, including: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, POP3, PostgreSQL, SMTP-AUTH, Telnet and VNC. Medusa … Continue reading

How To Bypass Antivirus Detection – Making An Executable FUD

antivirus_5

So in this tutorial we will show you step by step on how to make a virus Fully Undetectable from all the antiviruses. Their are lots of approaches, however here we will take a look at how to make an executable FUD … Continue reading

Tutorial: MDK3 – Network Traffic Disruption

2008-11-06-wifi

Today, we are going to go over some options with the tool MDK3, however it has to be said that the use of these options can wreak havoc on wireless networks and should be used with caution ! And of … Continue reading

Mimikatz: Windows Powershell Script for Dumping Local and Domain Passwords

powershell_2

clymb3r recently posted a script called “Invoke-Mimikatz.ps1” basically what this does is reflectively injects mimikatz into memory, calls for all the logonPasswords and exits. It even checks the targets architecture (x86/x64) first and injects the correct DLL. This is really … Continue reading

How To Hack: Creating an iOS7 Application Pentesting Environment

Unix-Iphone

Now that you have your shiny new Evasion7 jailbreak running it’s time to set up the environment for application testing! Getting in Since mobile substrate is not working yet we will focus on getting our idevice up and running as … Continue reading

How To Hack: Exploit SNMP for Reconnaissance

Hugh-Jackman-Swordfish

The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). … Continue reading

How to Hack: Snatch the Sysadmin Password from Remote Desktop Protocol (RDP)

cain-rdp

One of the keys to becoming a professional and successful hacker is to think creatively. There is always a way to get into any network or system, if you think creatively. In previous tutorials, I have demonstrated ways to crack … Continue reading

Historical Hacking Philes: A Beginners Guide to Hacking Unix by Jester Sluggo (1985)

A-BEGINNERS-GUIDE-TO-Hacking-Unix-740x230

************************************** * A beginners guide to: * * H A C K I N G * * * * U N I X * * * * By Jester Sluggo * * Written 10/08/85 * ************************************** In the following file, … Continue reading

How To Hack: Change the Signature of Payloads to Evade Antivirus

crypting

I’ve written several listener guides on creating a malicious PDF or malicious Word document that would carry in it a payload with the Meterpreter, or reverse shell enabling you to own the system. One of the hurdles to using these … Continue reading

Historical Hacking Philes: My Favourite UNIX Commands, By ZeeBee (1990)

Unix-1

*** My Favourite UNIX Commands *** *** A List Of Some OF The Most Useful UNIX ** *** Hacking Commands, and Some Hints On Their Usage *** *** Written By ZeeBee Australia Inc. 1990 *** Ok UNIX freaks, here is … Continue reading

Hacking Tricks: LANs.py – Packet Parsing/Injecting ARP Poisoner

One_Byte_at_a_Time

LANs.py: (Download at Github) Individually poisons the ARP tables of the target box, the router and the DNS server if necessary. Does not poison anyone else on the network. Displays all most the interesting bits of their traffic and can … Continue reading

Book: Hacking, 2nd Edition by No Starch Press

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really … Continue reading